Harden the device

Recommendations to optimize cybersecurity in a protected environment:

  • Harden the meter according to your company’s policies and standards.
  • Review assumptions about protected environments and address potential risks and mitigation strategies. See Product defense in depth for details.
  • Change the default password. See Passwords for details.
  • Change the communication protocol ports from their default values. This lowers the predictability of port use.
  • Disable communication protocol ports when they are not in use. This reduces the attack surface.